General

  • Target

    3cab8491d810560b793f8862ae69784d_cryptolocker_JC.exe

  • Size

    115KB

  • MD5

    3cab8491d810560b793f8862ae69784d

  • SHA1

    fa0ec90de1a7c767826e688a318fa4c32034ddc8

  • SHA256

    f8bf3511e47be944dc77f1626e0dc5f0f22b7682851cf252eec492b8ffea234b

  • SHA512

    0c8f766403762c3f338154c8f38880f64702f873fcf61c421b4dfdd2a32658bbd3d7dbaa5e0a4c7eb927e4f22fc05d4e2893728cac01c19ed1d78f5ee10f872f

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G1md:AnBdOOtEvwDpj6z7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 3cab8491d810560b793f8862ae69784d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections